Anyone happen to run across this same issue.....We run wired 802.1x on
all of our switch ports.  Majority of our desktop clients are Windows
XP SP3.  We used PEAP-MSCHAPV2 with a public certificate signed by the
Thawte CA within radiator.  In my PEAP configuration on the XP clients
I tell the client to validate the certificate but have NO CA's
selected from the certifcate trust store.  This will allow a
certificate signed by any of the CA's that are in the CA cert store to
be validated properly.  This works like a charm under XP with no
problems.  I'm aware of the potential downside and  consequences of
attacks doing it this way.

We now have some Windows 7 Enterprise clients going out the door and
have configured them in exactly the same way, having the client
validate the cert against any of the CA's (ie: NO CA's are checked).
This should use any certificate signed from any of the CA's within the
Windows CA Cert store.  The Windows 7 docs on Technet even say this
should work:

http://technet.microsoft.com/en-us/library/dd759154.aspx

In step 5c:  "If no trusted root CAs are selected, then clients trust
all trusted root CAs in their trusted root certification authority
store"

This doesn't appear to be the case.  If I don't select any trusted
CA's from this list the authentication fails against radiator and I
get the following in the radiator log file which indicates that the
client rejected the cert:

Mon Jan 30 11:18:41 2012: INFO: Access rejected for
host/MYCOMP-019489.domain.tld: EAP PEAP TLS read failed
Mon Jan 30 11:18:41 2012: ERR: EAP PEAP TLS read failed:  19339: 1 -
error:14094419:SSL routines:SSL3_READ_BYTES:tlsv1 alert access denied

Looking at the client supplicant logs I can see that the client does
reject it because no CA is selected.

If I go back and select only the Thawte Primary Root CA, then
authentications work properly and the client can connect without
issues.

I know this isn't a radiator thing, just wondering if others have ran
across this inconsistency with Windows 7 at all.  Not sure if a recent
Windows patch broke the functionality as it was originally as
explained in the above Technet article or if it just never worked.
I'll probably open a case with MS to verify but I'm pretty sure others
have probably run across this already.

--greg


Gregory A. Fuller - CCNP, CCNA Security
Network Manager
State University of New York at Oswego
Phone: (315) 312-5750
http://www.oswego.edu/~gfuller
_______________________________________________
radiator mailing list
radiator@open.com.au
http://www.open.com.au/mailman/listinfo/radiator

Reply via email to